mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 07:35:20 +07:00
crypto:chtls: key len correction
corrected the key length to copy 128b key. Removed 192b and 256b key as user input supports key of size 128b in gcm_ctx Reported-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Atul Gupta <atul.gupta@chelsio.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
4d0312e00b
commit
a491b9321d
@ -213,7 +213,7 @@ static int chtls_key_info(struct chtls_sock *csk,
|
||||
struct _key_ctx *kctx,
|
||||
u32 keylen, u32 optname)
|
||||
{
|
||||
unsigned char key[CHCR_KEYCTX_CIPHER_KEY_SIZE_256];
|
||||
unsigned char key[AES_KEYSIZE_128];
|
||||
struct tls12_crypto_info_aes_gcm_128 *gcm_ctx;
|
||||
unsigned char ghash_h[AEAD_H_SIZE];
|
||||
struct crypto_cipher *cipher;
|
||||
@ -228,10 +228,6 @@ static int chtls_key_info(struct chtls_sock *csk,
|
||||
|
||||
if (keylen == AES_KEYSIZE_128) {
|
||||
ck_size = CHCR_KEYCTX_CIPHER_KEY_SIZE_128;
|
||||
} else if (keylen == AES_KEYSIZE_192) {
|
||||
ck_size = CHCR_KEYCTX_CIPHER_KEY_SIZE_192;
|
||||
} else if (keylen == AES_KEYSIZE_256) {
|
||||
ck_size = CHCR_KEYCTX_CIPHER_KEY_SIZE_256;
|
||||
} else {
|
||||
pr_err("GCM: Invalid key length %d\n", keylen);
|
||||
return -EINVAL;
|
||||
|
Loading…
Reference in New Issue
Block a user